How a Potential Attacker Sees You

Knowing as much about a target as possible increases the success rate of potential attacks. Our experts conduct and analyze deep level OSINT (Open-Source Intelligence) serving as the basis for the four main simulated attack vectors; Vishing, Phishing, SMiShing, and Impersonation. These are customized, thorough investigations providing actionable reporting and guidance for remediation. 


Deploy professionally trained social engineers for onsite impersonation day or night. Point-in-time testing of vendor/visitor access policies and physical perimeter. This full scope program is multi layered and may include badge cloning, credential harvesting, and network control.

Risk Assessment & Adversarial Simulation

This “human vulnerability scan” evaluates the online security posture of your highest value employees or company as a whole.  We then execute simulated attacks of spear vishing, phishing, and SMiShing based on the information we discover. 

Our Social Engineering Risk Assessment (SERA) and Adversarial Simulation (AdSim) provide attack surface data and testing enabling stakeholders to make informed decisions. 

Red Team Support

Augment your internal red team with trained and professional social engineers. We will work hand-in-hand with internal teams to test the human element of your network through remote consulting, feet-on-the-ground, and/or initial access testing through social engineering vectors.

Aftermath of a Social Engineering Engagement

You have heard all the stories. Social engineers (SEs) being held at gunpoint,…

Read More

Managing Your Vishing Defenses at Home

During the past 6 years at Social-Engineer, LLC (SECOM) we’ve made over 45,000…

Read More

Have You Ever Received One of Those Calls?

What Is Vishing? We define vishing as the “practice of eliciting information or…

Read More

Assess Your Risks
Assess Your Risks

We talk a lot about phishing, vishing, smishing, and impersonation here at…

Read More

In 2019 Test Impersonations
In 2019, Test Impersonation Attacks

At SECOM, we perform many forms of social engineering attacks, from phishing to…

Read More

Not All Phishing Programs Are Created Equal

In today’s corporate world, security awareness training should be a common…

Read More